Skip to content
Latest:
  • Oracle Database Security Overview – Part 2 -> Security Enhancements
  • Oracle Database Security Overview – Part 1 – Virtual Private Database
  • IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
  • Java Garbage Collectors – Moving to Garbage First (G1) Collector
  • Using Lambdas and Streams in Java 8
IndicThreads

IndicThreads

Software Developer Station

  • News
  • Articles
  • Interviews
  • Contact
  • About

Author: Atul Kahate

Articles 

Password Based Authentication Using Message Digests

March 10, 2008February 5, 2010 Atul Kahate 5082 Views 2 Comments atul kahate, Java Articles, user authentication

The question of how best to perform user authentication is a puzzle that is quite tough to solve. While newer

Read more
Articles 

Security and Threat Models – Secure Electronic Transaction (SET) Protocol

February 3, 2008February 5, 2010 Atul Kahate 7721 Views 3 Comments atul kahate, Java Articles, protocols, security, ssl, standardization

The subject of threat models is quite interesting in the information security space. It talks about how we model the

Read more
Articles 

Xml Security using Xml Encryption and Xml Digital Signature

December 18, 2007February 5, 2010 Atul Kahate 5090 Views 4 Comments Java Articles

The subject of XML security is quite over-hyped. The whole idea of XML security can be simply described as applying

Read more
Articles 

What are Digital Signatures? Compute and Verify a Digital Signature Using Java

July 11, 2007February 5, 2010 Atul Kahate 9469 Views 11 Comments Java Articles

Digital Signature is one of the most widely misunderstood terms in the area of computer security. People often either confuse

Read more
Articles 

Setting up Secure Web Authentication in Tomcat

April 18, 2007February 5, 2010 Atul Kahate 9970 Views 12 Comments Java Articles

User authentication is perhaps one of the most critical requirements of any Web application and is often taken for granted.

Read more
Articles 

Returning Arrays or Objects – A Security Problem in Java

March 13, 2007February 5, 2010 Atul Kahate 5774 Views 0 Comments Java Articles

Java deals with many of the security issues associated with arrays in languages such as C and C++, as it

Read more
  • Next →

Featured

Oracle Database Security Overview – Part 2  -> Security Enhancements
Articles 

Oracle Database Security Overview – Part 2 -> Security Enhancements

June 23, 2016 Saurabh Gupta 0
Oracle Database Security Overview – Part 1 – Virtual Private Database
Articles 

Oracle Database Security Overview – Part 1 – Virtual Private Database

June 23, 2016June 23, 2016 Saurabh Gupta 0
IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
News 

IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development

May 27, 2016June 1, 2016 Content Team 0
Java Garbage Collectors – Moving to Garbage First (G1) Collector
Articles 

Java Garbage Collectors – Moving to Garbage First (G1) Collector

May 25, 2016May 25, 2016 Content Team 0

Random

Excited About EJB 3.1 & JSF 2.0?

June 23, 2008February 5, 2010 Content Team 0

New RAD platform to fill the J2EE-AJAX void

September 21, 2005February 5, 2010 Content Team 0

Backbase Enterprise Ajax for Java Introduces Free Community Version

May 20, 2008February 5, 2010 Content Team 0

Cloud Computing Forces Rethink On Free Software Licenses

April 10, 2009February 5, 2010 Content Team 2

Recent Posts

  • Oracle Database Security Overview – Part 2 -> Security Enhancements
  • Oracle Database Security Overview – Part 1 – Virtual Private Database
  • IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
  • Java Garbage Collectors – Moving to Garbage First (G1) Collector
  • Using Lambdas and Streams in Java 8

Recent Posts

  • Oracle Database Security Overview – Part 2 -> Security Enhancements
  • Oracle Database Security Overview – Part 1 – Virtual Private Database
  • IndicThreads Pune 2016 To Equip Developers For A New Age Of Software Development
  • Java Garbage Collectors – Moving to Garbage First (G1) Collector
  • Using Lambdas and Streams in Java 8
  • News
  • Articles
  • Interviews
  • Contact
  • About
Copyright © 2026 IndicThreads. All rights reserved.